________ is a more sophisticated fraudulent e-mail attack that targets a specific person or organization by personalizing the message in order to make the message appear as if it is from a trusted source
A) Spear phishing
B) Cyber tunneling
C) Viral marketing
D) Logic bombing
E) Hacking
A
You might also like to view...
Which of the following would be included in a "stakeholder analysis"?
A. How people are affected by organizational policies and actions B. What people know, how they feel and what they do related to the problem C. Who is involved and how they are affected in the situation D. All of the above E. None of the above
Rawls's social justice theory includes which of the following?
A) The consultation of an outside source, such as a book or person, for guidance B) A set of universal rules based on reasoning which must be applied in all situations and are characterized by reversibility C) The belief that the moral rules should be determined by persons who have a "veil of ignorance" about their place or station in society D) The belief that a person must decide what course of action is proper based on that person's own set of beliefs or feelings E) Determining which course of action produces the greatest amount of good for the greatest number of people